Analysis

  • max time kernel
    63s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 18:00

General

  • Target

    60.msi

  • Size

    4.7MB

  • MD5

    ecdd7739e76adee32b9cd61f4a132963

  • SHA1

    14e5ec6b9c6bdaab641009284e2f41067462bf21

  • SHA256

    59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

  • SHA512

    91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

  • SSDEEP

    98304:5Yqd1ASubUZwPEDYPo6sAPGJ60TGEtof1SvfRL8YwlYfRa6:LHr0PdsAPGJVTGEOdSvfSUa

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3388
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\60.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:740
      • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
        "C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5300
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5704
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
          PID:1460
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 2F20DA58A13F292BBB018A7EC6F43B7A
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1376
        • C:\Users\Admin\AppData\Local\Kart\GmRemote.exe
          "C:\Users\Admin\AppData\Local\Kart\GmRemote.exe"
          2⤵
          • Checks for any installed AV software in registry
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
            C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious use of SetThreadContext
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:612
          • C:\Windows\SysWOW64\gpupdate.exe
            C:\Windows\SysWOW64\gpupdate.exe
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1848
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:5388

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57b401.rbs

        Filesize

        11KB

        MD5

        37d3314ff5410607e0bbe660fecaec5a

        SHA1

        c008b243a820555dd8b1619754bf739d64eeddcf

        SHA256

        dace8143008fb59826a74d497fe25b722b0b94263dfc47866cac77292a237679

        SHA512

        972dca0923afa58f47bc5f181e3753ac195520c405ee947be52d86408bf067d5ff07e4347db828c40b0d0055c301382eb42a78f448b3c110f94fd44cf4c26cf9

      • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe

        Filesize

        99KB

        MD5

        f61fa5ce25f885a9b1f549055c9911ed

        SHA1

        aba1c035b06017b0b0bd1c712669646e4f3765ab

        SHA256

        57e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb

        SHA512

        02e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac

      • C:\Users\Admin\AppData\Local\Temp\6f8ce29b

        Filesize

        2.8MB

        MD5

        9f2b0e4d218442927581577f52997f8d

        SHA1

        ab74e08d3a230260a545036c4ab423db1e4746e8

        SHA256

        47d20fa8d26cd6659bdcd45bce3a2666706d1e0b52b69ee023b58ac7e61bd936

        SHA512

        4f7db2f85793056884876be3506710833c2bed20b0fb0d13db0e347f28b4935fa20b1d5968b63f9877ea473aed6c8bf28dc91af0cacaeee43d63f31a87e44e8b

      • C:\Users\Admin\AppData\Local\Temp\732de198

        Filesize

        2.7MB

        MD5

        c5dfb872054df521385411e555a6b01d

        SHA1

        99879cc065990aa14af270c6018a4c077999d791

        SHA256

        8be4fc53030bc987e02b4206d245ac137cb1c00c3f7700f86cac440ab80344a6

        SHA512

        3ce9bdf93976c8169790ce2f9221acfaf749c9c73a05ec567880b2b20102d482aa8c20586c83f92a02c7ce8ac280bf533034d1a25d0dfd0e594202a531f25a38

      • C:\Users\Admin\AppData\Local\Temp\732de198

        Filesize

        2.7MB

        MD5

        da90920c3d50ae4cc158a498df0b86dd

        SHA1

        d085532220f21835241ae0e26839096d8e07ea85

        SHA256

        181611e250a9490c89204b0836682c6121d82fb1b9dc27a61e9a548dd01025b7

        SHA512

        e77f32d21e9b9bfef92a527e9182bbd59c3a7d257a196aea6d9f820f001254e781607988cba4e489dbf957f08e340b711b806be9b6e9cec74c4e8b3c0811ae30

      • C:\Windows\Installer\MSIB44C.tmp

        Filesize

        386KB

        MD5

        72b1c6699ddc2baab105d32761285df2

        SHA1

        fc85e9fb190f205e6752624a5231515c4ee4e155

        SHA256

        bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

        SHA512

        cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

      • C:\Windows\Installer\e57b3fe.msi

        Filesize

        4.7MB

        MD5

        ecdd7739e76adee32b9cd61f4a132963

        SHA1

        14e5ec6b9c6bdaab641009284e2f41067462bf21

        SHA256

        59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

        SHA512

        91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        24.1MB

        MD5

        5dfe70acab7ebd48bedf282e00c8a7ff

        SHA1

        fb32a9a196297794df12022ae801b80055c62320

        SHA256

        c4ab455056d5985262c65adfb7a1e96da3105b8363bdf15d04a2d83bafcb9cbf

        SHA512

        912f812659b624f3d37d5ec643ea2abe3e4d936533ebf345e13211981f94652b5740cd6a440bbee224b6a26ff53652ead35fb26505d35fed6a51aa63fcf702b0

      • \??\Volume{28d8005c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{39de163c-92c9-4faa-8f1d-d074a6b0767d}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        6dc1c6ceb08e604b9e0fb57c52d90c51

        SHA1

        acbe12e48ed29282f30b77bb0fd5372b62291978

        SHA256

        219292e556ca71e4cb7a326fa6fe1f82d5fa3c69d03e3e062e9bcbcc982b38b9

        SHA512

        028b666a2d226551c3beb6404e03f587298c1ecd5ac6de717d3df41b8348d1a520b7700515b8e708f459f328b0f1441f2f7bbdd9984cc427bfadcf6830fd4499

      • memory/612-110-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-98-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-1407-0x0000000006F10000-0x0000000006F64000-memory.dmp

        Filesize

        336KB

      • memory/612-60-0x0000000000730000-0x0000000000902000-memory.dmp

        Filesize

        1.8MB

      • memory/612-1406-0x0000000006260000-0x00000000062AC000-memory.dmp

        Filesize

        304KB

      • memory/612-63-0x00000000058E0000-0x0000000005A7C000-memory.dmp

        Filesize

        1.6MB

      • memory/612-64-0x0000000005F70000-0x00000000060E0000-memory.dmp

        Filesize

        1.4MB

      • memory/612-65-0x0000000006690000-0x0000000006C34000-memory.dmp

        Filesize

        5.6MB

      • memory/612-66-0x00000000061C0000-0x0000000006252000-memory.dmp

        Filesize

        584KB

      • memory/612-74-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-86-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-116-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-120-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-122-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-118-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-114-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-112-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-1405-0x0000000006550000-0x0000000006616000-memory.dmp

        Filesize

        792KB

      • memory/612-108-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-106-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-104-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-102-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-100-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-57-0x0000000075300000-0x0000000075591000-memory.dmp

        Filesize

        2.6MB

      • memory/612-96-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-94-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-92-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-88-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-84-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-82-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-80-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-79-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-76-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-72-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-70-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-68-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-90-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-67-0x0000000005F70000-0x00000000060DB000-memory.dmp

        Filesize

        1.4MB

      • memory/612-1404-0x0000000006330000-0x00000000063F8000-memory.dmp

        Filesize

        800KB

      • memory/3292-49-0x0000000075790000-0x00000000757DF000-memory.dmp

        Filesize

        316KB

      • memory/3292-50-0x00007FF9FEE30000-0x00007FF9FF025000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-56-0x0000000075790000-0x00000000757DF000-memory.dmp

        Filesize

        316KB

      • memory/3292-42-0x00000000002A0000-0x0000000000719000-memory.dmp

        Filesize

        4.5MB

      • memory/5300-1416-0x0000000000800000-0x00000000008D4000-memory.dmp

        Filesize

        848KB

      • memory/5300-1418-0x0000000004E70000-0x0000000004EC0000-memory.dmp

        Filesize

        320KB

      • memory/5300-1419-0x0000000005180000-0x0000000005342000-memory.dmp

        Filesize

        1.8MB